咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,231 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5348 条 记 录,以下是111-120 订阅
排序:
Research on distributed relational database based on MySQL
Research on distributed relational database based on MySQL
收藏 引用
2023 international conference on computer, Artificial Intelligence, and Control Engineering, CAICE 2023
作者: Shi, Lanying Wang, Kai Li, Man Tong, Jiangang Qiao, Hongming Jiang, Yiquan China Research Institute of China Telecom Co. Ltd. Guangzhou510000 China China Mobile Information Technology Co. Ltd. Guangzhou510000 China China Research Institute of China Telecom Co. Ltd. Shanghai200000 China
With the rapid development of big data, cloud computing, artificial intelligence and other technologies, the expansion of database application requirements and the change of computer hardware environment, especially t... 详细信息
来源: 评论
Implementation of QOS in SDN and distributed networks for mitigation of DDOS based attacks using Machine Learning  3
Implementation of QOS in SDN and Distributed Networks for mi...
收藏 引用
3rd IEEE international conference on Blockchain and distributed systems security, ICBDS 2024
作者: Kumar, Subhash Kolhe, Kishor Mit World Peace University School of Computer Engineering and Technology Pune India
distributed Denial Service of Service (DDoS) is very sophisticated attack which brute-force packet jamming to a network to render it useless, if done with large number of nodes. It can be easily countered by a number ... 详细信息
来源: 评论
Treaty: Secure distributed Transactions  52
Treaty: Secure Distributed Transactions
收藏 引用
52nd Annual IEEE/IFIP international conference on Dependable systems and networks (DSN)
作者: Giantsidi, Dimitra Bailleu, Maurice Crooks, Natacha Bhatotia, Pramod Univ Edinburgh Edinburgh Midlothian Scotland Univ Calif Berkeley Berkeley CA USA Tech Univ Munich Munich Germany
distributed transaction processing is a fundamental building block for large-scale data management in the cloud. Given the threats of security violations in untrusted cloud environments, our work focuses on: How to de... 详细信息
来源: 评论
DDoS Attacks Detection in IoT networks using Naive Bayes and Random Forest  3
DDoS Attacks Detection in IoT Networks using Naive Bayes and...
收藏 引用
3rd international conference on Applied Artificial Intelligence and Computing, ICAAIC 2024
作者: Srivastava, Animesh Tiwari, Shweta Rawat, Bhupender Singh Dhondiyal, Shiv Ashish Graphic Era Hill University Department of Computer Science & Engineering Dehradun India Institute of Engineering Chandigarh University Department of Computer Science & Engineering Department / University Punjab Gharuan Mohali India Coer University College of Smart Computing Roorkee India Department of Computer Science & Engineering Dehradun India
The proliferation of Internet of Things (IoT) devices has resulted in numerous benefits, including streamlined tasks and improved connectivity but has also raised concerns regarding security vulnerabilities. Distribut... 详细信息
来源: 评论
Blockchain Approaches for Healthcare: A Review and Outlook  5
Blockchain Approaches for Healthcare: A Review and Outlook
收藏 引用
5th international conference on Electronics and Sustainable Communication systems, ICESC 2024
作者: Shaikh, Natasha Kasar, Smita Maharashtra Institute of Technology Department of Computer Science & Engineering Aurangabad India
Nowadays, the application of information technology worldwide is accelerating the digital transformation of the healthcare sector. Incorporating blockchain technology into healthcare provides better and more innovativ... 详细信息
来源: 评论
A new framework for distributed clustering based data aggregation in WSN
A new framework for distributed clustering based data aggreg...
收藏 引用
international conference on Artificial Intelligence, Blockchain, Computing and security, ICABCS 2023
作者: Singh, Anuj Kumar Bhushan, Shashi Kumar, Ashish School of Computer Science and Engineering Galgotias University Greater Noida India Department of Computer Science ASET Amity University Punjab Mohali India Department of Computer Science and Engineering AKG Engineering College Ghaziabaad India
Wireless sensor networks (WSNs) are used in a variety of applications, such as industrial control systems, environmental monitoring, military applications, and structural health monitoring. Energy consumption is a key... 详细信息
来源: 评论
Analysis of Military security Surveillance Applications Using Wireless Sensor networks  1
Analysis of Military Security Surveillance Applications Usin...
收藏 引用
2023 1st DMIHER international conference on Artificial Intelligence in Education and Industry 4.0, IDICAIEI 2023
作者: Singla, Chaitanya Gill, Rupali Srivastava, Durgesh Hooda, Susheela Singh, Janpreet Institute of Engineering and Technology Chitkara University Punjab India School of Computer Science and Engineering Lovely Professional University Punjab India
Wireless Sensor networks are a type of device that converts any of the physical quantity to an understandable, and observable quantity. Sensors are lightweight and distributed in large numbers to monitor the type of s... 详细信息
来源: 评论
A Deep Residual Network-Based Approach to Reidentify Persons via Face Features Extraction from Video Frames  3
A Deep Residual Network-Based Approach to Reidentify Persons...
收藏 引用
3rd IEEE international conference on Blockchain and distributed systems security, ICBDS 2024
作者: Ghogale, Kedar Nagnathrao Apare, Ravindra Sadashivrao Borhade, Ravindra H. Savitribai Phule Pune University Sinhagad Technical Education Society's Smt. Kashibai Navale College of Engineering Department of Computer Engineering Maharashtra Pune India Savitribai Phule Pune University KJEI's Trinity College of Engineering and Research Pune Department of Information Technology Maharashtra Pune India
The rise of unwanted situations in today's environment has made video security more important. Video surveillance helps with anomaly identification and improves security in a number of areas, such as businesses, e... 详细信息
来源: 评论
A Comprehensive Study on Intrusion Detection System for distributed Blockchain Ledger security with Using Advanced Smart Contracts  8th
A Comprehensive Study on Intrusion Detection System for Dist...
收藏 引用
8th international conference on Information and Communication Technology for Intelligent systems, ICTIS 2024
作者: Vats, Shailender Kumar Peddi, Prasadu Vats, Prashant Department of Computer Application Institute of Computer Science and Engineering Shri Jagdishprasad Jhabarmal Tibrewala University Jhunjhunu Rajasthan Chudela India Uttar Pradesh Noida India Department of Computer Science Engineering and Information Technology Shri Jagdishprasad Jhabarmal Tibrewala University Rajasthan Jhunjhunu India Department of Computer Science and Engineering SCSE Manipal University Jaipur Rajasthan Jaipur India
The potential of blockchain technology to transform several industries, including supply chains, health care, and banking, has drawn much interest in recent years. Blockchain is becoming widely used, but this has rais... 详细信息
来源: 评论
The Smart Optimization of security systems in Wireless Personal Sensor networks  2
The Smart Optimization of Security Systems in Wireless Perso...
收藏 引用
2nd IEEE international conference on distributed Computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Das, Sunanda Sindhu Madhuri, G. Department of Computer Science and Engineering Bangalore India
Wireless personal sensor networks (WPSNs) are an emerging technology that provides a platform for monitoring and collecting data from a variety of sources. These networks are used to monitor environmental, health, and... 详细信息
来源: 评论